Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.

Hi there
Surely if this firm operated like this in Europe on European servers (or the US maybe in 'OZ too ? --not sure how the Federal Law in those countries works on this) Sony would probably be forced into Bankruptcy by now since the idea of holding IN PLAIN TEXT (or unencrypted) people's passwords would be in SERIOUS BREACH of the various data protection acts.

Thes acts state quite clearly it's an offence not only to GIVE OUT details to 3rd parties -- that's the usual interpretation -- but also there is an OBLIGATION TO KEEP SENSITIVE DATA SECURE AND SAFE.

This clearly hasn't been done - since if you can obtain the password of a user then you have access to all the other data on that account.

Most organisations when you have passwords can only RESET them for you if you lose them -- they don't keep PLAIN TEXT versions.

Is it just me but it seems so screamingly obvious to me NOT to hold plain text passwords - and I don't do a lot of work in I.T -- so can some of the more technical Gurus on this site explain to me is this a MANAGEMENT problem or an I.T one.

Whoever is responsible should not only be FIRED (No question of "being allowed to resign") and also do some SERIOUS JAIL TIME too.

They have been promising Sony attacks since this past weekend, a plan they called "the beginning of the end" for Sony. After being challenged to show what they found, the group today posted links on Twitter to samples of information they compromised on internal Sony networks and Web sites, including Sony Pictures, Sony Music Belgium, and Sony Music Netherlands.

On the site Pastebin, Lulzsec wrote: "We recently broke into SonyPictures.com and compromised over 1,000,000 users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts. Among other things, we also compromised all admin details of Sony Pictures (including passwords) along with 75,000 'music codes' and 3.5 million 'music coupons'."

The group said they didn't have the resources to copy all the information found, but is posting "samples" to prove their authenticity. The group claims they could have taken more, but that would have taken "several more weeks."

The files in the download appear to contain names, addresses, e-mail addresses, and passwords, but it was unclear how many were in the sample provided by the group.

One file labeled Sony BMG Music Entertainment Belgium included this note: "This target gave us LOLs as it provided internal release dates of records, barcodes, sales reports, and plaintext Sony employee passwords."

Viruses in winsxs and massive data hogging, need helpHey, i'm already pretty frustrated with this and full norton doesn't seem to be able to do all that much. i have over 24gigs in winsxs folder and norton only catches the tojans but they come back everytime i restart my computer, which runs really slow. mainly most of them get quarantined but the...

System Security

Playstation Network IssuesI'm having major issues when trying to sign into eu.playstation.com in any browser (IE, Chrome, FF4).
Sometimes I get the sign-in screen and sometimes not
Keeps redirecting me to the "Sign In/Sign Up" screen
Sometimes not loading at all
Sign-In Popup
Redirected page